Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Heba K. Aslan"'
Publikováno v:
Ain Shams Engineering Journal, Vol 15, Iss 4, Pp 102605- (2024)
The Massive Open Online Courses (MOOCs) platform offers communication channels for students to share concerns about the educational process. Due to the large number of students compared to the instructors’, it is challenging to identify urgent foru
Externí odkaz:
https://doaj.org/article/560e6b14204b4aa3937ab5e2e7d7b9d9
Autor:
Ghada Farouk Elkabbany, Hassan I. Sayed Ahmed, Heba K. Aslan, Young-Im Cho, Mohamed S. Abdallah
Publikováno v:
Symmetry, Vol 16, Iss 1, p 12 (2023)
The Nth-degree Truncated polynomial Ring Unit (NTRU) is one of the famous post-quantum cryptographic algorithms. Researchers consider NTRU to be the most important parameterized family of lattice-based public key cryptosystems that has been establish
Externí odkaz:
https://doaj.org/article/49c67f8f7c0a488cbc344ea106025df2
Publikováno v:
Journal of Advanced Research, Vol 12, Iss , Pp 67-78 (2018)
The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper
Externí odkaz:
https://doaj.org/article/fc218bd841dd48d081cd959cdecf884d
Publikováno v:
International Journal of Ambient Computing and Intelligence. 13:1-17
IoT is a huge network that contains many objects communicating with each other. It has a collection of sensitive data which is vulnerable to various threats at different layers. Due to the lack of infrastructure and the distributed control in IoT, th
Nth degree Truncated polynomial Ring Unit (NTRU) is one of the famous post-quantum cryptographic algorithms. Researchers consider NTRU as the most important parameterized family of lattice-based public key cryptosystems that has been established to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::28c47d8693e138f95e3175e42b9a89bc
https://doi.org/10.21203/rs.3.rs-2885476/v1
https://doi.org/10.21203/rs.3.rs-2885476/v1
Publikováno v:
International Journal of Safety and Security Engineering. 11:641-651
The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuat
Autor:
Ahmed M. Eltahlawy, Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer
Publikováno v:
Electronics. 12:1956
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs’ nodes create on-the-fly connections with each oth
Publikováno v:
International Journal of Ambient Computing and Intelligence. 12:114-139
Nowadays, Internet of Things (IoT) is considered as part our lives and it includes different aspects - from wearable devices to smart devices used in military applications. IoT connects a variety of devices and as such, the generated data is consider
Autor:
Ghada M. El Banby, Osama A. Elshakankiry, Fathi E. Abd El-Samie, Ashraf A. M. Khalaf, Mohamed M. Dessouky, Ahmed Sedik, Heba K. Aslan, Osama S. Faragallah, Heba A. Elnemr, Mohamed A. Elaskily
Publikováno v:
Multimedia Tools and Applications. 79:19167-19192
In this era of technology, digital images turn out to be ubiquitous in a contemporary society and they can be generated and manipulated by a wide variety of hardware and software technologies. Copy-move forgery is considered as an image tampering tec
Publikováno v:
Journal of Cybersecurity. 8
Personal credentials, such as passports and drivers’ licenses, can be implemented electronically using multi-show protocols. In this paper, we introduce an IoT Privacy-Oriented selective disclosure credential system, i.e. based on bilinear pairings